Results 11 to 20 of about 1,364,067 (299)

Computer Security

open access: yesIssues in Science and Technology Librarianship, 2002
This guide is intended to present a selected list of sites that cover the basic issues of computer security and which provide useful information for the non-expert (librarian, undergraduate student, office manager, etc.) who wants to learn more about ...
Jane F. Kinkus
doaj   +1 more source

Measurements and Correctness Criteria for Determining the Line Length of the Data Image Obtained in the Process of Electromagnetic Infiltration

open access: yesApplied Sciences, 2022
The protection of information against electromagnetic penetration is one of the most important aspects related to the protection of information against its non-invasive acquisition. Compared to the activities of cybercriminals, the use of electromagnetic
Ireneusz Kubiak, Artur Przybysz
doaj   +1 more source

Temporal Segment Connection Network for Action Recognition

open access: yesIEEE Access, 2020
Two-stream Convolutional Neural Networks have shown excellent performance in video action recognition. Most existing works train each sampling group independently, or just fuse at the last level, which obviously ignore the continuity of action in ...
Qian Li   +4 more
doaj   +1 more source

Towards operational measures of computer security [PDF]

open access: yes, 1993
Ideally, a measure of the security of a system should capture quantitatively the intuitive notion of ‘the ability of the system to resist attack’. That is, it should be operational, reflecting the degree to which the system can be expected to remain free
Brocklehurst, S.   +8 more
core   +2 more sources

Metis: An Integrated Morphing Engine CPU to Protect Against Side Channel Attacks

open access: yesIEEE Access, 2021
Power consumption and electromagnetic emissions analyses are well established attack avenues for secret values extraction in a large range of embedded devices.
Francesco Antognazza   +2 more
doaj   +1 more source

SECURITY OF TEACHING ACTIVITIES ONLINE [PDF]

open access: yesAnalele Universităţii Constantin Brâncuşi din Târgu Jiu : Seria Economie, 2021
The current pandemic context has led to the rapid transition of all online teaching activities, and the security of all activities has become vulnerable, largely due to limited awareness by students and teachers, creating a security breach through the ...
CARINA-ELENA STEGĂROIU   +2 more
doaj  

Constructing a Macro Virus to Upgrading Antivirus Programs [PDF]

open access: yesEngineering and Technology Journal, 2011
A virus is a self-replicating program that spreads by inserting copies of itself into other executable code or documents. a macro virus is a virus that is written in a macro language, a language built into a software application such as a Word processor,
Wesam S. Bhaya, Alaa Abd Alhesain
doaj   +1 more source

Delta system transfer function model for IEMI time domain test [PDF]

open access: yesITM Web of Conferences, 2022
Intentional electromagnetic interference (IEMI) is a serious threat to the stable operation of computer and other intelligent terminal equipment. For testing research on IEMI, it is very important to build a stable and reliable test system model for ...
Ma Rupo   +3 more
doaj   +1 more source

An Immune Inspired Approach to Anomaly Detection [PDF]

open access: yes, 2007
The immune system provides a rich metaphor for computer security: anomaly detection that works in nature should work for machines. However, early artificial immune system approaches for computer security had only limited success.
Aickelin, Uwe, Twycross, Jamie
core   +4 more sources

Human Factors in Security – Cybersecurity Education and Awareness of Business Students

open access: yesAnnales Universitatis Mariae Curie-Skłodowska Sectio H, Oeconomia, 2022
Theoretical background: The rapid development of Internet interactions and a growing number of information technology users caused by digital society development and accelerated by the COVID-19 pandemic yield the significant growth of cyber-attacks and ...
Łukasz Wiechetek, Marek Mędrek
doaj   +1 more source

Home - About - Disclaimer - Privacy